The area I believe i would be interested in most is likely Cybersecurity Instruction. Cybersecurity instruction can be described as the instruction, education, and raising awareness towards dangers in Cybersecurity. Essentially, what this allows is for a company to have employees and workers who are comfortable following cybersecurity procedures and taking the necessary steps to maintain safety. Not only just in terms of being comfortable, but education and capability is increased through the instruction of cybersecurity. This is why I would be interested in it, as it is an incredibly understated yet important way to raise general safety, and improve the efficiency of cybersecurity systems in place. Something I would not be interested in is cybersecurity legal advice. I am not really interested in the legal aspects of it and as such cannot see myself giving advice.

PrivacyRights.org has many helpful resources for studying breaches. Firstly, it has breach notifications in it’s database. This makes it so that all breaches on the database are notified and closely monitored. For compiling data on the frequency of attacks, this is an efficient way to record time frames and when databases may be at their most vulnerable. PrivacyRights also provides and estimate of impacted users. This is also helpful so that those doing research can understand the severity of these cyber attacks, and understand what demographics may be most affected by said attacks. There is a wealth of public information available.

Firstly, I will start with self actualization. I believe I can relate this with my experiences with social media and my desire for likes and to partake in what may be popular at the time. As for safety needs, I believe I can pretty perfectly relate this two things like two factor authentication and things like me proving I am a human. As for love and belongingness, this can relate to friends I have made through various mediums like social media and even some games. A sense of belonging seems to be pretty common for everyone on the internet, regardless of where as fitting in seems to be a common theme. Esteem relates back to what I said about self actualization, as the desire for likes and views can also be seen as a desire for respect. Physiology relates to base needs like purchasing of food and drink using the media to complete these purchases.

I would rank recognition lastly because I cannot imagine anyone doing anything for recognition. I put revenge next because the scenario in which someone would be doing these things for revenge seems slim. Next, I say boredom. While it seems silly, there are many talented people in the world with a lot of time on their hands and nothing better to do. After that is entertainment. I believe this is similar to boredom but just with a bit more of a reason. Then comes political. I can fathom a wealth of political reasons that could lead to a possible cybercrime. After that, I say for money. Money is a driving factor behind many crimes, both cyber and not. I think multiple reasons is at the top because it can combine multiple if not all of these. 

I found that I was able to determine three fake websites based off of user interaction. Websites without any user interaction or internet traffic are likely to be fake, as most real websites that are meant to be interacted with are. There are outliers to this, but I found that it was an effective way of determining the real from fake. Three fake websites that I found were localnews33.com, lopezreports.com, and maymoodpost.com. As opposed to popular real websites such as wikipedia, youtube, and whatsapp. These are websites that have real user interaction and feedback, allowing for an easy determination and verification on the validity of these sites.

The first meme I would create is based off of the image of the dog with glasses on the computer. It would say “me looking at my password get hacked after I made it too weak”. The second would be the image of the hands typing on a computer. It would say “me setting up two factor authentication on all my websites and apps”. Lastly, I would use the image of the man sitting outside looking at his computer. This one would say “me enjoying my time on the internet knowing my data is completely safe from hackers.

Media is a big part of our every day lives. From TV,  to social media, to video games, it influences how we see the world at large around us. An affect of media is that it manages to influence how we think about and see various things. I think, in relation to medias impact on cybersecurity, I can input my own experiences. Due to social media, I was under the impression that cybersecurity was a useless or not helpful field because of sensationalization of AI and romanticizing of hackers. Now I understand that cybersecurity helps keep our world stable as of 2024.

I scored a one on this scale. The only one that I was able to apply to my own life was the occasional neglect of important things in life in favor of procrastination and utilization of social media. I think these disorders and patterns may arise due to the vicious cycle of social media, and how it may scratch certain itches in the brain. It is disturbing to me that such a scale even exists, as it truly highlights the dangers social media, and how it can truly affect the human psyche. It is an extremely interesting topic to me.

Mainly, I honestly felt a bit of fear from this article. Social cybersecurity, which affects people on a national level, is a subset of cyberseurity. By attacking these social cybersecurity systems that may hold together an entire nation, a dangerous act of warfare can be committed. It is extremely dangerous, as there are many details about each of us, and important information like income, address, and maybe even banking info. A large scale attack can truly affect and cripple an entire nation or society, and understanding the vulnerability of our data. By understanding this vulnerability, it can be a little frightening. 

Justin Addo
Cyberbullying and Cyberbullicide Ideation among Jordanian College Students
Research proposal and methods
This article essentially looks at cyberbullying, both perpetrators of cyberbullying and victims.
The research done in this article essentially compiles numbers taken from their studies and
research and applies them to look at the general scale of cyberbullying among these college
students. The studies are conducted as follows. A sample of 1000 Jordanian college students of
random courses and levels of college are selected, and given a questionnaire which aims not
only to understand how many students were victimized, but also relation with victims and
knowledge of perpetrators. Using this info, the research proposal is given, that lack of
awareness in such an issue brings about mental and physical repercussions on a sizeable
scale. (Doha, Qatar 2024). The main usefulness of this study is to showcase that in fact,
cyberbullying can be extremely negatively impactful on people, especially younger
demographics that can possibly be more impressionable and easily influenced by these things.
This study allows us to understand possible effects of cyberbullying, as well as peoples that
may be more likely to be impacted by this. Using these studies, we can better understand
cyberbullying and its social effects, and work towards counteracting these things. I believe this
all ties in to our lessons as it was made clear that the internet can have a very clear correlation
with mental health. It is important we understand these things to stay safe.
https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/329/98
Investigating the intersection of AI and cybercrime: Risks, Trends, and Countermeasures
The research proposal of this article aims simply to raise awareness into an intersection and or
correlation between AI, and cybercrimes. The study starts essentially by looking at AI as a
whole, utilizing CHATGPT as an example to showcase potential positive applications of AI, and
look at the integration of AI objectively. The history of AI is explored (Sanaika Shetty 2024 pg 4)
To give us a look at the original interpretation of AI. This information proves useful in this study
because it allows us a full view of AI as a whole. The negative effects are also explored by
looking back upon the walkthrough of it’s history and positive applications. Now that the study
has took us into the capabilities of AI, we can look at the negative impacts of AI as well. I
believe this relates to our lesson as it does not say that we should abandon or rethink our usage
of AI, but merely uses statistics to grant us awareness of these things.
https://docs.google.com/document/d/1OAkVdUFEYFUF8S6apaQ_JWHTaXf1p0eLVJTiFJIljp8/e
dit

ustin Addo
Sun Nov 17, 2024
Article Review
This article touches on the role and importance of training cybersecurity employees effectively.
Cybersecurity is almost always a group effort, with companies and corporations employing
teams composed of individuals in the cybersecurity field, with the objective of creating a group
of individuals that are capable of employing and efficient cyber defense and protect industry
secrets. This article proposes that an important part of employee training, and a skill that needs
to be taught is phishing awareness training. Phishing awareness training essentially helps
employees be extremely literate against phishing threats, which are an extremely common
cyber attack that many fall victim to “ Impact of Cybersecurity and AI’s related on incident
reporting suspicious behavior and employees stress: Moderating role of cybersecurity training”.
By having this efficient training in place for employees, they can be internet literate and use this
training to not only protect themselves, but also to protect others in the company. Adding to this,
phishing simulation exercises are efficient when it comes to training this awareness. It is
important for security teams to have this level of awareness so that they can properly analyze
potential threats, as well as understanding how to potentially defend themselves. When it comes
to implementing proper systems in defense, knowing how phishing works helps the employees
implement the best strategies to not only detect it, but to cut it off at its root. I think that this
article does a very good job in communicating the importance of proper training for employees,
but also giving us an insight into some training strategies for employees that yield particularly
good results. All in all, I believe this was a great insight into the importance of proper training for
employees, and I feel as though I gained a lot of useful knowledge from this article.
Muthuswamy, V. V. (2024). Impact of cybersecurity and AI’s related factors on incident reporting
suspicious behaviour and employees stress: Moderating role of cybersecurity training.
International Journal of Cyber Criminology, 18(1), 86-100.

Justin Addo
Career paper
In practically all jobs, social sciences interact with and shape the development of these careers
and pathways. While on the topic, Social sciences is a science and group of disciplines that focus
on and study the behavior of humans, and their interactions with each other, the environment,
and the cultures they reside. It aims to break down human interactions and the overall impact and
psychological factors that may go into these interactions. Social sciences has a huge influence
and sway on our careers, and the career cluster that I will be focusing on today is the
cybersecurity careers. More specifically, I aim to focus on the career known as a security analyst.
Security analysts aim is to, usually in a team of individuals, analyze threats to cybersecurity and
also analyze potential systems and solutions to various different kinds of threats and different
types of cyber attacks. This career, like practically all, interacts with the social sciences. It is a
common misconception that jobs involving cyber security do not interact with the social aspect
of our world, but that is untrue. I aim to break down, explain, and simplify the correlation
between the position of the Security Analyst and the social sciences.
The position of Security Analyst is practically forced to interact with the social sciences. This is
because of an application of social sciences known as “Social Engineering”, typically used by
cyber attackers and hackers. Social engineering is essentially manipulation, using this
manipulation to gain access to personal information and possibly even grant permissions to those
who would otherwise not possess this access. By understanding this social engineering and these
manipulations tactics, helping potential victims avoid these threats becomes a lot easier. Another
way Security Analysts need to interact with social engineering goes along with this previous

point. Understanding user behaviors and habits, such as things these users may be more inclined
to do and vice versa. Using these likely behaviors, implementing systems that can protect users
at their more vulnerable moments, which are discerned by the social studies, these
implementations can be simple but extremely effective. By understanding the people that these
security analysts interact with, defense becomes far easier, and is practically impossible. Finally,
a social aspect of this career is communication. Communication is essential for security analysts
due to the fact that they most often work in teams. By managing to properly communicate
defense tactics and threats, defense becomes far more efficient.
All in all, cybersecurity is truly ingrained into our very society. Because of this, the social
aspects of the career paths involved in cybersecurity are incredibly important. Even despite that
fact, however, this importance is extremely understated and misunderstood. I believe it is
extremely important to fully embrace the social aspects of this career, as it is ever growing in our
society, and likely will not go. Our interactions with cybersecurity, and it’s interactions with us,
are both integral and a fact of life. By understanding the social sciences of things, we can keep
ourselves safe.